Abstract
Mobile Network Operator (MNO) and Mobile Virtual Network Operator (MVNO) evidence have become an important evidentiary focus in the courtroom. This type of evidence is routinely produced as business records under U.S. Federal Rules of Evidence for use in the emerging discipline of Forensic Cell Site Analysis. The research was undertaken to determine if evidence produced by operators should be classified as digital evidence and, if so, what evidence handling methodologies are appropriate to ensure evidence integrity. This research project resulted in the creation of a method of determining if business records produced by MNO/MVNO organizations are digital evidence and whether evidentiary integrity is maintained in the conveyance of evidence between MNO/MVNO records custodians, law enforcement investigators and attorneys in criminal and civil cases. Block-chain based Distributed Ledger Technology was examined as a feasible evidence integrity maintenance solution.
References
[1] American Society for Testing and Materials (ASTM)(2018), Standard Terminology for Digital and Multimedia Evidence. Retrieved on December 15, 2018 from https://compass.astm.org/EDIT/html annot.cgi?E2916+13#s00007
[2] American Society for Testing and Materials (ASTM)(2018). ASTM E3016-18 Standard Guide for Establishing Confidence in Digital and Multimedia Evidence Forensic Results by Error Mitigation Analysis. Retrieved on January 4, 2019, from https://www.astm.org/Standards/E3016.htm
[3] Bonomi, Silvia & Casini, Marco & Ciccotelli, Claudio. (2018). B-CoC: A Block-chain-based Chain of Custody for Evidences Management in Digital Forensics. Retrieved on June 6, 2019, from https://www.researchgate.net/publication/326681814 B-CoC A Block-chain-based Chain of Custody for Evidences Management in Digital Forensics
[4] Cisco (2011). The Case for IP Backhaul -The Internet Protocol Journal, Volume 14, No. 3. Retrieved on January 4, 2019, from https://www.cisco.com/c/en/us/about/press/internet-protocol-journal/back-issues/table-contents-53/143-backhaul.html
[5] Curran,Kevin, Harran, Martin, & Farrelly, William. (2017). A method for verifyingintegrity & authenticating digital media.Letterkenny Institute of Technology, Donegal, Ireland, Ulster University, Derry, United Kingdom. Retrieved on June 6, 2019, from https://doi.org/10.1016/j.aci.2017.05.006
[6] European Telecommunications Standards Institute (ETSI). (2005). Universal Mobile Telecommunications System (UMTS); Telecommunication management; Charging management; Charging architecture and principles (3GPP TS 32.240 version 6.2.0 Release 6)
[7] Retrieved on January 4, 2019,from http://www.etsi.org/deliver/etsits/132200 132299/132240/06.02.00 60/ts 132240v060200p.pdf
[8] European Telecommunications Standards Institute (ETSI). (2014) Digital cellular telecommunications system (Phase 2+); Universal Mobile Telecommunications System (UMTS); LTE; Telecommunication management; Charging management; Diameter charging applications. Retrieved on January 4, 2019, from https://www.etsi.org/deliver/etsi-ts/132200-132299/132299/09.17.00-60/ts-132299v091700p.pdf
[9] European Telecommunications Standards Institute (ETSI). (2016). Digital cellular telecommunications system (Phase 2+) (GSM); Universal Mobile Telecommunications System (UMTS); LTE; Telecommunications management; Charging management; Charging Data Record (CDR) file format and transfer (#GPP TS version 13.2.0 Release 13). Retrieved on January 4, 2019, from http://www.etsi.org/deliver/etsits/132200_132299/132297/13.02.0060/ts_132297v130200p.pdf
[10] European Telecommunications Standards Institute (ETSI). (2017). ETSI Digital cellular telecommunications system (Phase 2+); Universal Mobile Telecommunications System (UMTS); LTE; Telecommunication management; Charging management; Charging Data Record (CDR) parameter description. Retrieved on January 4, 2019, from http://www.etsi.org/deliver/etsi ts/132200132299/132298/12.06.00_60/ts132298v120600p.pdf
[11] Gramoli, Vincent & Staples, Mark. (2018). Block-chain Standard: Can We Reach Consensus?. IEEE Communications Standards Magazine. 2. 16-21. 10.1109/M-COMSTD.2018.1800022.
[12] International Organization for Standardization (ISO)(2012). Information technology | Security techniques | Guidelines for identification, collection, acquisition and preservation of digital evidence. Retrieved on January 4, 2019, from https://www.iso.org/obp/ui/#iso:std:isoiec:27037:ed-1:v1:en
[13] Internet Engineering Task Force (IETF)(2002). Guidelines for Evidence Collection and Archiving. Retrieved on January 4, 2019, from http://www.ietf.org/rfc/rfc3227.txt
[14] Internet Engineering Task Force (IETF)(2005). Common Format and MIME Type for Comma-Separated Values (CSV) Files. Retrieved on January 4, 2019, from https://tools.ietf.org/html/rfc4180
[15] Internet Engineering Task Force (IETF)(2011). Fundamental Elliptic Curve Cryptography Algorithms. Retrieved on January 4, 2019, from https://tools.ietf.org/html/rfc6090
[16] Internet Engineering Task Force (IETF)(2016). Elliptic Curves for Security. Retrieved on January 4, 2019, from https://tools.ietf.org/html/rfc7748
[17] Lone, Auqib Hamid & Mir, Roohie Naaz,. (2019). Forensic-chain: Block-chain based digital forensics chain of custody with PoC in Hyperledger Composer. Department of Computer Science and Engineering, NIT Srinagar, Jammu and Kashmir, 190006, India. Retrieved on June 6, 2019, from https://www.sciencedirect.com /science/arti-cle/pii/S174228761830344X
[18] Minor, J. B. (2015). A method of validating cellular carrier records accuracy, U.S. Patent No. 9,113,307. Washington, DC: U.S. Patent and Trademark Office. Retrieved on January 4, 2019, from https://www.google.com/patents/US9113307
[19] Minor, John B. (2017) "Forensic Cell Site Analysis: A Validation & Error Mitigation Methodology," Journal of Digital Forensics, Security and Law: Vol. 12: No. 2, Article 7. DOI: https://doi.org/10.15394/jdfsl.2017.1474 Retrieved on January 4, 2019, from https://commons.erau.edu/jdfsl/vol12/iss2/7
[20] National Institute of Standards and Technology (NIST)(2000). DIGITAL SIGNATURE STANDARD (DSS). Retrieved on December 14, 2019,
from https://csrc.nist.gov/csrc/media/publications/fips/186/2/archive/2000-01-27/documents/fips186-2.pdf
[21] National Institute of Standards and Technology (NIST)(2007). Guidelines on Cell Phone Forensics. Retrieved on December 14, 2019, from http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-101r1.pdf
[22] National Institute of Standards and Technology (NIST)(2006). Guide to Integrating Forensic Techniques into Incident Response. Retrieved on December 14, 2019, from http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-86.pdf
[23] Openchain. (2019) Openchain is an open source distributed ledger technology. Retrieved on January 4, 2019, from https://www.openchain.org/
[24] Pennsylvania Superior Court. (PSC)(2016). Commonwealth of Pennsylvania vs. Bryant Jones, No. 865 WDA 2015 (page 17). Retrieved on January 4, 2019, from http://www.pacourts.us/assets/opinions/Superior/out/J-S37012-16m.pdf
[25] Peredo, Oscar & Deschamps, Romain. (2017). Time Accuracy Analysis of Post-Mediation Packet-Switched Charging Data Records for Urban Mobility Applications. Retrieved on January 4, 2019, from https://www.researchgate.net/publication/316921278 Time Accuracy Analysis of Post-Mediation Packet-Switched Charging Data Records for Urban Mobility Applications
[26] Scientific Working Group on Digital Evidence (SWGDE)(2017). SWGDE Recommendations for Cell Site Analysis. Retrieved on January 4, 2019, from https://www.swgde.org/documents/CurrentDocuments/SWGDE Recommendations for Cell site Analysis.
[27] The National Domestic Communications Assistance Center. (NDCAC)(2018).Retrieved on January 4, 2019, from https://ndcac.fbi.gov/
[28] United States Courts Federal Rules of Evidence (FRE).(2019). Exception to the Rule Against Hearsay. Retrieved on January 4, 2019, from https://www.rulesofevidence.org/article-viii/rule-803/
Recommended Citation
Minor, John B.
(2019)
"Forensic Cell Site Analysis: Mobile Network Operator Evidence Integrity Maintenance Research,"
Journal of Digital Forensics, Security and Law: Vol. 14
, Article 5.
DOI: https://doi.org/10.15394/jdfsl.2019.1608
Available at:
https://commons.erau.edu/jdfsl/vol14/iss2/5